메뉴 건너뛰기




Volumn 2515, Issue , 2002, Pages 339-352

Security attributes based digital rights management

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRIME; MULTIMEDIA SYSTEMS; NETWORK SECURITY;

EID: 84948954094     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36166-9_29     Document Type: Conference Paper
Times cited : (10)

References (32)
  • 1
    • 0034316289 scopus 로고    scopus 로고
    • “Digital rights management and watermarking of multimedia content for m-commerce applications
    • F Hartung and F. Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications,” IEEE Communications Magazine, vol. 38, pp. 78–84, Nov 2000.
    • (2000) IEEE Communications Magazine, , vol.38 , pp. 78-84
    • Hartung, F.1    Ramme, F.2
  • 7
    • 84949042975 scopus 로고    scopus 로고
    • Digital rights management (Drm) using xrml
    • H. Guo, “Digital rights management (drm) using xrml,” in Telecommunications Software and Multimedai TML-C7, 2001. http://www.tml.hut.fi/Studies/T-110.501/2001/papers/.
    • (2001) Telecommunications Software and Multimedai TML-C7
    • Guo, H.1
  • 9
    • 7544225008 scopus 로고    scopus 로고
    • A license management model to support b2c and c2c music sharing
    • Hong Kong, May
    • S. H. Kwok and S M. Lui, “A license management model to support b2c and c2c music sharing,” in 10th International World Wide Web Conference, Hong Kong, pp. 136–137, May 2001.
    • (2001) 10Th International World Wide Web Conference , pp. 136-137
    • Kwok, S.H.1    Lui, S.M.2
  • 24
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • USENIX Press, January
    • B. Schneier and J. Kelsey, “Cryptographic support for secure logs on untrusted machines,” in The 7th USENIX Security Symposium Proceedings, pp. 53–62, USENIX Press, January 1998.
    • (1998) The 7Th USENIX Security Symposium Proceedings , pp. 53-62
    • Schneier, B.1    Kelsey, J.2
  • 26
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (Blowfish)
    • Springer-Verlag, December
    • B. Schneier, “Description of a new variable-length key, 64-bit block cipher (blowfish),” in Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 191–204, Springer-Verlag, December 1994.
    • (1994) Fast Software Encryption, Cambridge Security Workshop Proceedings , pp. 191-204
    • Schneier, B.1
  • 29
    • 83455251951 scopus 로고    scopus 로고
    • Streaming media
    • January
    • F LaMonica, “Streaming media,” Linux Journal, vol. 81, January 2001.
    • (2001) Linux Journal , vol.81
    • Lamonica, F.1
  • 30
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
    • G. Lowe, “Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR,” Software Concepts and Tools, vol. 17, pp. 93–102, 1996.
    • (1996) Software Concepts and Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 32
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann, “The model checker SPIN,” IEEE Transactions on software engineering, vol. 23, no. 5, pp. 279–295, 1997. http//cm.bell-labs.com/cm/cs/who/gerard/.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.